summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-03 18:45:14 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-04-03 18:45:14 +0000
commit317dbc7c2270bf0510f95e6c5436ff37b81534d4 (patch)
tree7178db0df1a42fa41989379892fed0980322f90c
parenteb4c4d03a20213f03846c3337b2019da1fd92f15 (diff)
downloadchromium_src-317dbc7c2270bf0510f95e6c5436ff37b81534d4.zip
chromium_src-317dbc7c2270bf0510f95e6c5436ff37b81534d4.tar.gz
chromium_src-317dbc7c2270bf0510f95e6c5436ff37b81534d4.tar.bz2
Re-order some ifdefs in CertVerifyProcTest
BUG=none TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/9934004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@130424 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--net/base/cert_verify_proc_unittest.cc26
1 files changed, 16 insertions, 10 deletions
diff --git a/net/base/cert_verify_proc_unittest.cc b/net/base/cert_verify_proc_unittest.cc
index c276ecb..5799200 100644
--- a/net/base/cert_verify_proc_unittest.cc
+++ b/net/base/cert_verify_proc_unittest.cc
@@ -129,17 +129,17 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) {
CertVerifyResult verify_result;
int error = Verify(paypal_null_cert, "www.paypal.com", flags, NULL,
&verify_result);
-#if defined(USE_OPENSSL) || defined(OS_MACOSX) || defined(OS_WIN)
+#if defined(USE_NSS)
+ EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
+#else
// TOOD(bulach): investigate why macosx and win aren't returning
// ERR_CERT_INVALID or ERR_CERT_COMMON_NAME_INVALID.
EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
-#else
- EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
#endif
// Either the system crypto library should correctly report a certificate
// name mismatch, or our certificate blacklist should cause us to report an
// invalid certificate.
-#if !defined(OS_MACOSX) && !defined(USE_OPENSSL)
+#if defined(USE_NSS) || defined(OS_WIN)
EXPECT_TRUE(verify_result.cert_status &
(CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
#endif
@@ -855,7 +855,8 @@ TEST_P(CertVerifyProcWeakDigestTest, Verify) {
const WeakDigestTestData kVerifyRootCATestData[] = {
{ "weak_digest_md5_root.pem", "weak_digest_sha1_intermediate.pem",
"weak_digest_sha1_ee.pem", false, false, false, false, false },
-#if !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ "weak_digest_md4_root.pem", "weak_digest_sha1_intermediate.pem",
"weak_digest_sha1_ee.pem", false, false, false, false, false },
#endif
@@ -869,7 +870,8 @@ INSTANTIATE_TEST_CASE_P(VerifyRoot, CertVerifyProcWeakDigestTest,
const WeakDigestTestData kVerifyIntermediateCATestData[] = {
{ "weak_digest_sha1_root.pem", "weak_digest_md5_intermediate.pem",
"weak_digest_sha1_ee.pem", true, false, false, true, false },
-#if !defined(USE_NSS) && !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem",
"weak_digest_sha1_ee.pem", false, true, false, false, false },
#endif
@@ -885,7 +887,8 @@ INSTANTIATE_TEST_CASE_P(VerifyIntermediate, CertVerifyProcWeakDigestTest,
const WeakDigestTestData kVerifyEndEntityTestData[] = {
{ "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem",
"weak_digest_md5_ee.pem", true, false, false, false, false },
-#if !defined(USE_NSS) && !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem",
"weak_digest_md4_ee.pem", false, true, false, false, false },
#endif
@@ -910,7 +913,8 @@ WRAPPED_INSTANTIATE_TEST_CASE_P(MAYBE_VerifyEndEntity,
const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = {
{ NULL, "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem",
true, false, false, true, false },
-#if !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ NULL, "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem",
false, true, false, false, false },
#endif
@@ -934,7 +938,8 @@ WRAPPED_INSTANTIATE_TEST_CASE_P(
const WeakDigestTestData kVerifyIncompleteEETestData[] = {
{ NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem",
true, false, false, false, false },
-#if !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem",
false, true, false, false, false },
#endif
@@ -960,7 +965,8 @@ const WeakDigestTestData kVerifyMixedTestData[] = {
"weak_digest_md2_ee.pem", true, false, true, true, false },
{ "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem",
"weak_digest_md5_ee.pem", true, false, true, false, true },
-#if !defined(OS_MACOSX) // MD4 is not supported.
+#if defined(USE_OPENSSL) || defined(OS_WIN)
+ // MD4 is not supported by OS X / NSS
{ "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem",
"weak_digest_md2_ee.pem", false, true, true, false, false },
#endif